Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario
Journal of King Saud University - Computer and Information Sciences - Tập 34 - Trang 6808-6817 - 2022
Tài liệu tham khảo
Albouq, 2020, A double obfuscation approach for protecting the privacy of IoT location based applications, IEEE Access, 8, 129415, 10.1109/ACCESS.2020.3009200
Alzoubi, 2021, Fog computing security and privacy issues, open challenges, and blockchain solution: an overview, Int. J. Elec. Comput. Eng., 11
Amuthan, 2020, Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing, J. Ambient Intell. Hum. Comput., 11, 5217, 10.1007/s12652-020-01849-8
Bonomi, 2012, August). Fog computing and its role in the internet of things, 13
Chen, 2016, Preserving user location privacy for location-based service, 290
‘How Intel’s Homomorphic Encryption Can Process Ciphertext’. Available online: https://cisomag.eccouncil.org/homomorphic-encryption-standard/ Accessed on: 17 January 2022.
Dang, 2019, A survey on internet of things and cloud computing for healthcare, Electronics, 8, 768, 10.3390/electronics8070768
Desai, 2021, Security and privacy issues in fog computing for healthcare 4.0, 291
Duckham, 2005, A formal model of obfuscation and negotiation for location privacy, 152
Elkhodr, 2013, A contextual-adaptive location disclosure agent for general devices in the internet of things, 848
‘Understanding Time Complexity with Simple Examples’ Available online: https://www.geeksforgeeks.org/understanding-time-complexity-simple-examples/ Accessed on: 17 January 2022.
‘IAMAI Kantar ICUBE, Report’ https://www.iamai.in/KnowledgeCentre 2020 Available at: Accessed on: 11 October 2021.
Jain, 2020, A comparative study of location privacy preservation in the internet of things, Proc. Comput. Sci., 171, 1760, 10.1016/j.procs.2020.04.189
Javadzadeh, 2020, Fog computing applications in smart cities: a systematic survey, Wireless Netw., 26, 1433, 10.1007/s11276-019-02208-y
Kachore, 2015, Location obfuscation for location data privacy, 213
Kaur, 2020, Security issues in fog environment: a systematic literature review, Int. J. Wireless Inf. Networks, 27, 467, 10.1007/s10776-020-00491-7
Kaur, 2021, Importance of fog computing in healthcare 4.0, 79
Lee, 2015, On security and privacy issues of fog computing supported Internet of Things environment, 1
MATLAB. Available online: http://www.mathworks.com Accessed on: 11 October 2021.
Min, 2020, Tools and techniques for privacy-aware, edge-centric distributed deep learning, 7
Monikandan, 2015, Confidentiality technique to enhance security of data in public cloud storage using data obfuscation, Ind. J. Sci. Technol., 8, 1
Mukherjee, 2017, Security and privacy in fog computing: challenges, IEEE Access, 5, 19293, 10.1109/ACCESS.2017.2749422
Naik, 2019, Location privacy using data obfuscation in fog computing, 1286
Puliafito, 2017, Fog computing for the internet of mobile things: issues and challenges, 1
Puri, 2020, Data anonymization for privacy protection in fog-enhanced smart homes, 201
Razaq, 2021, Privacy-aware collaborative task offloading in fog computing, IEEE Trans. Comput. Social Syst.
Ullah, 2018, ESOT: A new privacy model for preserving location privacy in Internet of Things, Telecommun. Systems, 67, 553, 10.1007/s11235-017-0352-x
Verma, 2019, Security and privacy issues in fog driven IoT environment, Int. J. Comput. Sci. Eng., 7, 367
Verma, 2021, Interval-valued intuitionistic fuzzy-analytic hierarchy process for evaluating the impact of security attributes in fog based internet of things paradigm, Comput. Commun., 175, 35, 10.1016/j.comcom.2021.04.019
Verma, 2021, A systematic survey on fog steered IoT: architecture, prevalent threats and trust models, Int. J. Wireless Inf. Networks, 28, 116, 10.1007/s10776-020-00499-z
Yazici, 2018, Edge machine learning: enabling smart internet of things applications, Big Data Cognitive Comput., 2, 26, 10.3390/bdcc2030026
Yi, 2015, Security and privacy issues of fog computing: a survey, 685